Filter

Meine letzten Suchanfragen
Filtern nach:
Budget
bis
bis
bis
Typ
Fähigkeiten
Sprachen
    Jobstatus
    470 xor Gefundene Jobs, Preise in EUR

    Circuits to be laid out : 1. An INVERTER Use: (W/L)n = 1.0/0.045 and (W/L)p = 2.0/0.045 2. A 2-input NAND gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 2.0/0.045 3. A 2-input NOR gate Use: (W/L)n = 1.0/0.045 and (W/L)p = 4.0/0.045 4. A 2-input XOR gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 5. A complex gate F = (A+B)•(C+D) Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 All circuits are to be laid out using Cadence Virtuoso.

    €17 (Avg Bid)
    €17 Gebot i.D.
    1 Angebote

    I am looking for a skilled freelancer to help me with my project. The project involves designing an ALU, implementing RAM memory, and creating a pipelined datapath. Functionality of the ALU: - Basic arithmetic operations (addition, subtraction, multiplication, division) - Logical operations (AND, OR, XOR) Type of memory: - RAM Preferred architecture for the datapath: - Pipelined Ideal skills and experience for the job: - Strong knowledge of digital logic design and computer architecture - Experience with designing and implementing ALUs, RAM memory, and pipelined datapaths

    €150 (Avg Bid)
    €150 Gebot i.D.
    14 Angebote

    I am seeking a skilled engineer to design a multiplexer and develop a novel XOR gate for a specific application. The successful candidate will need to have expertise in digital circuit design and using QCA designer tool. The job entails the following tasks: - Designing a multiplexer with specified specifications - Developing a novel XOR gate utilizing innovative techniques - Knowledge of QCA designer tool - Conducting functional and performance testing Skills required: - Digital circuit design - Knowledge of multiplexers and XOR gates - Experience in functional and performance testing

    €50 (Avg Bid)
    €50 Gebot i.D.
    1 Angebote

    You should be able to layout some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are describe...some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are described below 1. An INVERTER Use: (W/L)n = 1.0/0.045 and (W/L)p = 2.0/0.045 2. A 2-input NAND gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 2.0/0.045 3. A 2-input NOR gate Use: (W/L)n = 1.0/0.045 and (W/L)p = 4.0/0.045 4. A 2-input XOR gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 5. A complex gate F = (A+B)•(C+D) Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 All circuits are to be laid out using Cade...

    €143 (Avg Bid)
    €143 Gebot i.D.
    3 Angebote

    You whould be able to layout some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are describe...some basic CMOS logic gates. This requires familiarity with Cadence Virtuoso tool . It includes some widely used basic CMOS logic gates. The circuits to be laid out are described below 1. An INVERTER Use: (W/L)n = 1.0/0.045 and (W/L)p = 2.0/0.045 2. A 2-input NAND gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 2.0/0.045 3. A 2-input NOR gate Use: (W/L)n = 1.0/0.045 and (W/L)p = 4.0/0.045 4. A 2-input XOR gate Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 5. A complex gate F = (A+B)•(C+D) Use: (W/L)n = 2.0/0.045 and (W/L)p = 4.0/0.045 All circuits are to be laid out using Cade...

    €96 (Avg Bid)
    €96 Gebot i.D.
    5 Angebote

    I am looking for a skilled C++ developer to modify an existing c++ code, that currently uses XOR encryption algoritm for a function to encrypt pictures and text after compiling the exe. The decrypt key is written is currently written in the buffer. The exe needs to be able to decrypt the data when needed. Overall, I am seeking a developer who is knowledgeable in C++ and encryption algorithms, particularly AES. Experience with code modification and providing technical advice is highly desired.

    €423 (Avg Bid)
    €423 Gebot i.D.
    21 Angebote

    ...fast compact coding is critical. Recursion might simplify the coding. Be aware that worst case ANF can expand to 2^N terms. A lower state management scheme is likely to be more successful and faster, than calling frames and stack allocation. It would be useful to use switch/case to parse the compressed tree stream, and avoid if/elseif/elseif/else ANF is Algebraic Normal Form ... a special AND/XOR boolean algebra form. See the wikipedia description. the anfct.c file has one omission, and that is if the first character of a CT stream is '~' the expression is in complement form, IE is "1 ^ ctexpression", such that the string "AnBnCn~12132333n" represents "1 ^ A&C ^ A&B ^ A&B&C" and the string "A[3]n~12132333n&quo...

    €119 (Avg Bid)
    €119 Gebot i.D.
    29 Angebote

    I am hoping find the solution for UDT binary files with xor and from vb6 that will work with vb.net I have prepared a project that has some vb6 code to be converted with a run of batching file data

    €69 (Avg Bid)
    €69 Gebot i.D.
    17 Angebote

    - Hidden String XOR -Hidden all Text in .DLL

    €62 (Avg Bid)
    €62 Gebot i.D.
    19 Angebote

    Hello, I am looking for someone to help me fix the source code of my Polymorphic Crypter that I have created. The source code of the stub is completely finished, I'm looking for someone who can help me to fix this one which continues to be detected by some antiviruses. The stub is coded in C++, the encryption algorithm used is XOR. I am looking for someone who is knowledgeable, able to help me rewrite my source code and change the problems it has. The purpose of the crypter is to encrypt an .exe file (any type of .net/native file 64/32bits etc) so that it cannot be detected by antivirus software (scantime/runtime). I am looking for someone who has done similar projects, if someone with good knowledge sends me a message and is sure of him we can arrange the price. Please co...

    €452 (Avg Bid)
    €452 Gebot i.D.
    22 Angebote

    Hello, I am looking for someone to help me fix the source code of my Polymorphic Crypter that I have created. The source code of the stub is completely finished, I'm looking for someone who can help me to fix this one which continues to be detected by some antiviruses. The stub is coded in C++, the encryption algorithm used is XOR. I am looking for someone who is knowledgeable, able to help me rewrite my source code and change the problems it has. Please contact me if you think you can. I will give more information in private, thank you.

    €451 (Avg Bid)
    €451 Gebot i.D.
    11 Angebote

    create an algorithm with and, or, not , xor plus pseudocode and flow chart and create a code for python with byte and decimal

    €24 (Avg Bid)
    €24 Gebot i.D.
    11 Angebote

    XOR based source routing is a routing technique based on binary linear algebra rather than scanning of routing or forwarding table. The input and output interface is represented as a binary string , XORed together to get a router interface label such that during forwarding the input interface is XORed with the router interface to get the output interface. The task is to write a python code which takes the value of number of vertices of a graph as input, create a random graph with full mesh structure. Secondly take a source and a destination node as input, use shortest path algorithm to get a path and then forward the packet from source to destination with the XOR based source routing technique. Further explanations of XOR Based Source Routing is given in the journal be...

    €60 (Avg Bid)
    €60 Gebot i.D.
    2 Angebote

    XOR based source routing is a routing technique based on binary linear algebra rather than scanning of routing or forwarding table. The input and output interface is represented as a binary string , XORed together to get a router interface label such that during forwarding the input interface is XORed with the router interface to get the output interface. The task is to write a python code which takes the value of number of vertices of a graph as input, create a random graph with full mesh structure. Secondly take a source and a destination node as input, use shortest path algorithm to get a path and then forward the packet from source to destination with the XOR based source routing technique. Further explanations of XOR Based Source Routing is given in the journal b...

    €22 (Avg Bid)
    €22 Gebot i.D.
    1 Angebote

    ...is encoded as a path ID and all such paths are advertised from a particular source to a particular destination. We want to explore two scenarios, in the first one, a path is being randomly encoded and in the second one the path is being encoded using XOR based source routing technique(further details are enclosed in the files attached). The problems faced in Preferred Path Routing is the number of paths from a source to a destination is a non deterministic polynomial, and hence forwarding table becomes too large. To overcome this problem, XOR based encoding is used to create a path label. In the process of creation of a path label, for each node, the interface label is created by XORing the input interface ID with the output interface ID, such that one can be retrieved by ...

    €29 - €57
    €29 - €57
    0 Angebote

    ...is encoded as a path ID and all such paths are advertised from a particular source to a particular destination. We want to explore two scenarios, in the first one, a path is being randomly encoded and in the second one the path is being encoded using XOR based source routing technique(further details are enclosed in the files attached). The problems faced in Preferred Path Routing is the number of paths from a source to a destination is a non deterministic polynomial, and hence forwarding table becomes too large. To overcome this problem, XOR based encoding is used to create a path label. In the process of creation of a path label, for each node, the interface label is created by XORing the input interface ID with the output interface ID, such that one can be retrieved by ...

    €23 - €46
    €23 - €46
    0 Angebote

    Here is 1 link I need to pass. I want to use anti**** service to solve re**** v2 then get px3 value of this site. here is the link: I...here is the link: I wish it was made from php. or curl if possible. I tried decrypting the payload string after decoding the re*** on my server but failed. i used base64 and xor 32 but i only solved the other half that was encrypted. Please help me as quickly as possible. thank!

    €234 (Avg Bid)
    €234 Gebot i.D.
    11 Angebote

    ...is encoded as a path ID and all such paths are advertised from a particular source to a particular destination. We want to explore two scenarios, in the first one, a path is being randomly encoded and in the second one the path is being encoded using XOR based source routing technique(further details are enclosed in the files attached). The problems faced in Preferred Path Routing is the number of paths from a source to a destination is a non deterministic polynomial, and hence forwarding table becomes too large. To overcome this problem, XOR based encoding is used to create a path label. In the process of creation of a path label, for each node, the interface label is created by XORing the input interface ID with the output interface ID, such that one can be retrieved by ...

    €23 - €46
    €23 - €46
    0 Angebote

    Cicada-69420 This event is based on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue ...based on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue 1) First password is ‘zain’ Clue 2) No capitals are used Clue 3) Rot13 Base64 XOR Clue 4) You do not n...

    €47 (Avg Bid)
    Garantiert
    €47
    5 Einträge

    Cicada-69420 This event is based on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue 1) ...on a combination of riddles, cryptography, and technical skills. Individually, or in teams, you must interpret the information that we have provided you with, in order to solve the challenge. It will be apparent when this is done. This image is all that you need, however, clues will be progressively released. Clue 1) First password is ‘zain’ Clue 2) No capitals are used Clue 3) Rot13 Base64 XOR Clue 4) You do not ne...

    €234 (Avg Bid)
    €234 Gebot i.D.
    1 Angebote
    algorithm Beendet left

    • The algorithm for adding two integers must be based on the use of standard logical operations which have direct hardware implementation (AND, OR, XOR, NOT)

    €11 - €22
    Versiegelt
    €11 - €22
    4 Angebote

    I need to perform XOR of an array with 100k arrays. The size of each array is 10k. Also, I need to do the other way round. I need to even monitor the GPU times i.e computation and transfer time and show it"s faster then CPU I have also asked on stack overflow " "

    €7 - €17
    €7 - €17
    0 Angebote

    XOR multiple ciphertexts to decrypt ciphertexts. Please refer to pdf for full instructions.

    €9 (Avg Bid)
    €9 Gebot i.D.
    2 Angebote

    I would like someone who can perform a handshake with a websocket for a multiplayer game. The task is to be able to log-in the game and perform an action. Though, the messages between the client and the websocket are XOR encrypted which makes it a more of a difficult job. Please contact me for more details

    €23 (Avg Bid)
    €23 Gebot i.D.
    1 Angebote

    ...signature but the main logic within this function should be inline assembly code using the ASM block similar to the assembly example in the Program Specification: long mult ( long op1, long op2 ) Can’t use the MUL/IMUL instructions, meaning you use ADD repeatedly If there are overflow, return the overflowed values in RAX register long XOR ( long op1, long op2 ) xor will return the result of bit exclusive OR of op1 / op2 can use XOR instruction long rotate ( long op1, long direction, long number_of_bits ) rotate will perform logical bit-rotation of input operand (op1) direction = 0 for left and 1 for right number_of_bits will dictate how many bits to rotate left or right you need to use rcl and rcr assembly instructions long factorial ( long op1 ) Input ...

    €113 (Avg Bid)
    €113 Gebot i.D.
    5 Angebote

    Hata yapmak her insanın doğal bir özelliğidir. Dosyalarınızı şifreledikten sonra hata yaparsanız tekrar onlara ihtiyacınız olduğunda ortada kalmamanız için sizlere böyle bir hizmet sunmaktayım. Ioncube ile şifrelenmiş php dosyalarınızı çözerek mağduriyetinizi hızlı bir şekilde gideririm. Basic PHP Decoder 6€ for each File IonCube - PHP 5.3/5.4/5.5/5.6 SourceCop - PH...Javascript & Python Decoder 7€ for each File eval(function(p,a,c,k,e,d){e=function(c) var enkripsi javascript files (unescape & var hex Python Unmarshal Decoder love = 'x6fx61x44x74' god = 'x4ax32x78x76' Lua Decoder €11 LuaQ - LuaS Revo All Version azael - IronBrew2 GameGuardian Lua Luraph Obfuscator loadstring Lua bytecode - Lua Hex ... Lua Obfuscator ...

    PHP
    €440 (Avg Bid)
    €440 Gebot i.D.
    9 Angebote

    2. Implement 2-bus processor with a hardwired control unit: The processor has the following characteristics. • Instructions: Add, Or, Sub, Ori, Xor, Ld, St, La, Br, Brnz, Stop, Shl. • Data bus is 32 bits. • Address bus is 16 bits. • 24 general purpose registers. • Shift instruction should be executed within one clock cycle. i need the VHDL code using Quartus prime Note if its late we will not pay

    €47 (Avg Bid)
    €47 Gebot i.D.
    1 Angebote
    assigment VHDL Beendet left

    2. Implement 2-bus processor with a hardwired control unit: The processor has the following characteristics. • Instructions: Add, Or, Sub, Ori, Xor, Ld, St, La, Br, Brnz, Stop, Shl. • Data bus is 32 bits. • Address bus is 16 bits. • 24 general purpose registers. • Shift instruction should be executed within one clock cycle. in VHDL code using quartes prime

    €148 (Avg Bid)
    €148 Gebot i.D.
    12 Angebote

    1. Implement 2-bus processor with a hardwired control unit: The processor has the following characteristics. • Instructions: Add, Or, Sub, Ori, Xor, Ld, St, La, Br, Brnz, Stop, Shl. • Data bus is 32 bits. • Address bus is 16 bits. • 24 general purpose registers. • Shift instruction should be executed within one clock cycle.

    €115 (Avg Bid)
    €115 Gebot i.D.
    3 Angebote

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    €114 (Avg Bid)
    €114 Gebot i.D.
    1 Angebote

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    €112 (Avg Bid)
    €112 Gebot i.D.
    2 Angebote

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    €80 (Avg Bid)
    €80 Gebot i.D.
    1 Angebote

    Dr Watson is worried that a 56 bit key is not long enough, so he has invented a new combination of DES with a one-time...to decrypt P?” “Ah, that’s the clever bit” says Watson modestly. “The government then encrypts the pad R under a second shared DES key k2, and sends that to the embassy as well. The attacker will need to guess both k1 and k2 correctly to decipher P, and that’s 112 bits! Not only that, but the one-time pad really is unbreakable, so the ambassador can keep on using the same k1 and k2. “ GàE: E"#(P XOR R), E",(R) “Oh dear, says Holms sadly, “I think Moriarty would have no more difficulty with your system than he would with ordinary DES. Embassy messages are very formal, and we must assume that Mo...

    €64 (Avg Bid)
    €64 Gebot i.D.
    1 Angebote

    ...C: How to Declare Variable, Initialize, Print, Example 11. Storage Classes in C: auto, extern, static, register class in C 12. C Files I/O: Create, Open, Read, Write and Close a File 13. Functions in C Programming with Examples: Recursive, Inline 14. Pointers in C Programming: What is Pointer, Types & Examples 15. Functions Pointers in C Programming with Examples 16. C Bitwise Operators: AND, OR, XOR, Shift & Complement (with Example) 17. C Dynamic Memory Allocation using malloc(), calloc(), realloc(), free() 18. TypeCasting in C: Implicit, Explicit with Example 19. Powershell Tutorial for Beginners: Learn in 1 Day 20. Difference between Structure and Union 21. C++ Vs. C# - What’s the Difference? 22. Difference Between C and C++ 23. Difference between C and Java 24....

    €168 (Avg Bid)
    €168 Gebot i.D.
    11 Angebote

    Demo project that has 2 routes. I route is the incoming reference data that is popped into a sorted array held in ram. Other route is the number we are searching using a binary search tree. We are simply creating a large data buffer of numbers that will be searched Route 1 - Accept t...do mysql later) 2 - If there is not match, permute 1 bit at a time and search the library again. - flip bit 1, search, undo, flip bit 2, search undo, ..... flip bit 64, search undo 3 - If there is no match with 1 bit in error move to 2 bits in error - flip bit 1 and bit 2, search, undo bit 2, flip bit 3 search, undo bit 3, ....... (this could be a nest loop) - flipping bits is done via xor function. XOR(2^bit,num) where bit is from 0-63 Nodejs lib exists for circular buffer, bindery se...

    €69 (Avg Bid)
    €69 Gebot i.D.
    2 Angebote

    The application I need is a virtual print driver that gets the printer's out and save it to a PDF file with Random Unique File Name. (eg: Timestamp) and should save automatically. I might be able to rebuild it in Microsoft Visual Studio 2015 (and later) in C# XOR C++. Printed PDF File should be Same as Microsoft PRINT 2 PDF Output. I want to use a virtual printer with my own brand. You can use external PDF solution if in its licence I can make commercial use in final application. But I must be able to install the application and all its dependencies in one single setup process, in order to distribute the MSI or setup executable without any assistance. So any required library must be shipped with solution developed. Additionally, the application must have the follo...

    €672 (Avg Bid)
    €672 Gebot i.D.
    5 Angebote

    ...24 6C 97 20 9C 91 97 2F F6 66 77 D7 50 4B C1 41 AB D5 79 9F 66 1A 52 2C AC 81 69 5E 62 DA 94 62 (that's the valid result by the way, you can use this example to test your script) Be careful, these are hexadecimal characters but the value is represented each time by two digits (16*16=base 256). I added space to better understand the logic behind it. A few tips : 1) sum is "add" operation, not "xor" operation. 3) hex dump is not sequence of hex digits. It's sequence of bytes (two digits per byte): 85A9 doesn't mean 8 5 A 9. it means 85 A9. 3) the order is reverse: "least significant" byte is first. The final goal is to reproduce what the 7zip tool does with its CRC-SHA256 feature but in PHP... So we would get the exact same result, ...

    PHP
    €168 (Avg Bid)
    €168 Gebot i.D.
    3 Angebote

    The calculator should support T, F, not, and, nand, or, xor, nor, then, equiv and brackets, error detection.

    €22 (Avg Bid)
    €22 Gebot i.D.
    23 Angebote

    ...given as 0.35 and 0.45 2. Learning coefficient is 0.9 3. Threshold value is 5.5 (2). Simulate NOR operation. There are two input units and one output unit. Input patterns are (0, 0), (0, 1), (1, 0), and (1, 1). The output will be either 1 or 0. The given parameters are as follows; 1. Initial weights are given as 0.9 and 0.5 2. Learning coefficient is 0.8 3. Threshold value is -1.5 (3). Simulate XOR (exclusive or) operation. There are two input units and one output unit. Input patterns are (0, 0), (0, 1), (1, 0), and (1, 1). The output will be either 1 or 0. The given parameters are as follows; 1. Initial weights are given as 0.5 and 0.2 2. Learning coefficient is 0.7 3. Threshold value is 2 Submit the following files through Western Online. • source code file • source c...

    €21 (Avg Bid)
    €21 Gebot i.D.
    2 Angebote

    The 4-bit array multiplier and baugh wooley multiplier which one is good multiplier and low power consumption l compare the parameter analysis like delay,area,power then design a vlsi physical design like import,floorplaning, placement,clock tree synthesis ,routing ,and finally implemented nexys4ddr board implemented.

    €144 - €431
    €144 - €431
    0 Angebote

    Need to build custom openvpn to make ti work in stealth mode. The VPN Traffic should be able to overcome dpi used by ISPs to block VPN. The packet length should be variable and not static. Tunneblick xor patch has already been tried and its getting blocked. So we need a custom patch that can make the openvpn traffic with variable packet length.

    €46 / hr (Avg Bid)
    €46 / hr Gebot i.D.
    7 Angebote

    Hi Abhishek G., I noticed your profile and would like to ask if you're able to decrypt compiled lua files, we assume they are compiled with XOR encryption. We can discuss any details over chat.

    €7 / hr (Avg Bid)
    €7 / hr Gebot i.D.
    1 Angebote

    ...default) while True: (question + prompt) choice = raw_input().lower() if default is not None and choice == '': return valid[default] elif choice in valid: return valid[choice] else: ("Please respond with 'yes' or 'no' " "(or 'y' or 'n').n") def xor(data, key): return bytearray(a^b for a, b in zip(*map(bytearray, [data, key]))) def str_xor(s1, s2): return "".join([chr(ord(c1) ^ ord(c2)) for (c1,c2) in zip(s1,s2)]) def ed(data, key): resultStr = "" for c in data: dc = ord(c) newD = dc for a in key: new...

    €34 (Avg Bid)
    €34
    6 Einträge

    F: A string which is an S-expression of a ZOL formula. You can assume: The operators used are IF,IFF,AND,OR,XOR,and NOT. The NOT operator has one argument, a wff The IF, IFF,and XOR operators have two wffs as arguments The special = predicate takes two objects as arguments (= is in prefix form, not infix) The AND and OR operators have two or more arguments All predicates have zero or more arguments All functions will have zero or more arguments All predicate, function, and object symbols will be alphanumberic strings All formulae are well-formed Symbols may be overloaded---type is determined through position Returns a list [S, P, O, Fn] where: S is a string telling us whether F was satisfiable: “T” – If the formula is a tautology, “S” – I...

    €56 (Avg Bid)
    €56 Gebot i.D.
    1 Angebote

    We need a simple C++ function converted to Python: int lrc = 0; for (auto bit : "C20000000000001000x03") lrc = lrc XOR bit; return lrc; The correct return value of this function is "115".

    €20 (Avg Bid)
    €20 Gebot i.D.
    4 Angebote

    Hi I am looking for VPN App developer for Android who can work on OPENVPN Obfuscate (Scramble). You can bid if you are experienced and have done similar project. openvpn obfuscate (openvpn Scramble) or in other words he should be able to use XOR PATCH for OPENVPN ANDROID VPN APP DEVELOPER WHO CAN BUILD VPN BY USING XOR PATCH AND OPENVPN OBFUSCATE (SCRAMBLE)

    €1192 (Avg Bid)
    €1192 Gebot i.D.
    17 Angebote

    We are large sets of fingerprints that we are performing hamming distance calculations on (xor and sum bits). The python implementation using numpy is not fast enough. Each CPU has a dedicated register called popcount that performs the XOR and sum of 2 64 bit numbers in 1 CPU cycle. So if your clock speed is 1 ghz, 1 E9 hamming calc's per second in its purest form. Our fingerprints are 10 bytes each so it may need to be done in two clock cycles. In the attached example we will process two sets of data in python. You can run the code easily and it is well commented. We want the Cpython replacement that is matrix/vectorized like our example and utilizes popcount. It must be a drop in replacement. Please benchmark speeds and provide the end result speeds and samp...

    €82 (Avg Bid)
    €82 Gebot i.D.
    6 Angebote